2024 RSAC #3
View Show IndexSegments
1. Identity is Security: Okta is leading the fight against Identity-based attacks – David Bradbury – RSA24 #3
As companies adopt new digital cloud technologies, cybercrime threats are on the rise and becoming more sophisticated. Identity has come under attack in today’s digital-first environment and is critical to ensure we can securely connect people to technology. Okta is on a mission to eliminate identity threats and clear the path for organizations to safely use any technology.
Segment Resources: https://www.okta.com/blog/2024/02/introducing-the-okta-secure-identity-commitment/
https://www.okta.com/products/okta-ai/
https://www.okta.com/blog/2024/02/okta-acquisition-advances-identity-powered-security/
This segment is sponsored by Okta. Visit https://securityweekly.com/oktarsac to learn more about them!
Guest
David Bradbury is the Chief Security Officer at Okta. He oversees security execution, and is responsible for a team navigating the evolving threat landscape to best protect employees and customers. He is also at the forefront of helping Okta’s customers adopt and accelerate Zero Trust security strategies.
Prior to Okta, David was the Senior Vice President and Chief Security Officer at Symantec where he oversaw all cyber security and physical security programs. He has an international reputation for leading and delivering cybersecurity at scale. David has worked across the globe from his native Australia to the UK and the US, leading highly regarded security teams at some of the world’s largest banks including ABN AMRO, Barclays, Morgan Stanley and the Commonwealth Bank of Australia.
David has a Bachelor’s Degree in Computer Science from the University of Sydney.
Host
2. Introducing Nightwing – A New Intelligence Services Company, 40 Years in the Making – Jon Check – RSA24 #3
On April 1, Nightwing, formerly a business unit of Raytheon, launched as a standalone company. The company’s Vice President of Cyber Protection Solutions, Jon Check, will discuss the transition to Nightwing and its approach to the most pressing cybersecurity challenges, helping customers stay ahead of today’s threats.
This segment is sponsored by Nightwing. Visit https://securityweekly.com/nightwingrsac to learn more about them!
Guest
Jon Check is the Vice President of Cyber Protection Solutions at Nightwing. He
leads the team that delivers proactive cybersecurity and next-generation technology to protect customers from persistent cybersecurity threats. Prior to this role, Jon held executive positions at Raytheon, CSRA Inc, and IBM Global Business Services. Jon is also a board member and former chairman of the National Cybersecurity Alliance, a board member of the U.S. Cyber Games, and an AFCEA DC board member. He holds a Bachelor of Arts in environmental science from the University of Virginia.
Host
3. Achieving Cyber Resilience and Strengthening Security Posture – Andy Grolnick – RSA24 #3
Organizations today are overwhelmed with the sheer magnitude of potential cybersecurity threats and there is plenty of vendor buzz around AI in Security products, but what is the reality? Threat detection and incident response (TDIR) strategy and execution have never been more critical and are essential in maintaining cyber resilience and strengthening the security posture of every organization. TDIR aims to identify potential threats and respond before they can impact a business. A layered defense focuses on identifying threat activity, prioritizing investigations, and measuring risk. As a result, organizations can take the appropriate threat mitigation steps. These security strategies and protocols signify a step forward with a TDIR strategy where everyone from the CISO to the security analyst wins.
This segment is sponsored by Graylog. Visit https://securityweekly.com/graylogrsac to learn more about them!
Guest
As CEO of Graylog, Andy Grolnick drives the company strategy to help organizations and IT professionals solve security, compliance, operational, and DevOps issues. Andy brings over thirty years of experience building and leading high-growth technology businesses in enterprise software, security, and storage. He also currently serves on the boards of Resurface and ThreatX. Previously, Andy served as Chairman & CEO of LogRhythm for 14 years and VP/General Manager of Iomega’s Zip Drive division.
Host
4. External Cybersecurity – Margarita Barrero – RSA24 #3
Axur is a cost-effective external cybersecurity solution that empowers security teams to handle threats beyond the perimeter. Our platform detects, inspects, and responds to brand impersonation, phishing scams, dark web mentions, threat intel vulnerabilities, and more.
Segment Resources: https://www.axur.com/en-us/partners https://www.axur.com/en-us/outsourced-takedown https://www.axur.com/polaris/home
This segment is sponsored by Axur. Visit https://securityweekly.com/axurrsac to learn more about them!
Guest
With over 15 years of experience, Margarita is Head of International Business at Axur. During her professional career, Margarita has led internationalization projects for technology companies and value-added distributors and manufacturers of SaaS solutions.
Host
5. Leveraging AI to Streamline Identity Security – Jeff Margolies – RSA24 #3
AI is more than just a buzzword. Done right, AI can improve decision making and scale your identity security platform to manage every identity, human and machine, physical and digital. Learn about how Saviynt’s #1 Identity Security platform is leveraging a variety of AI capabilities to enhance the user experience and improve identity security and compliance, bringing AI to life in a practical, market leading way to drive value for our customers.
Segment Resources: https://saviynt.com/blog/analytics-ai-automation-and-abstraction-pioneering-the-next-chapter-in-identity-security/
This segment is sponsored by Saviynt. Visit https://www.securityweekly.com/saviyntrsac to learn more about them!
Guest
Jeff Margolies is the Chief Product and Strategy Officer of Saviynt where he leads strategy, technology partnerships, and corporate development. As a member of the executive team, Jeff works closely with customers, partners and across the organization to develop a vision and long term roadmap for Saviynt. He leads several strategic initiatives to drive growth and deliver on the vision. Prior to joining Saviynt, Jeff spent over 25 years in the security and Identity industry, as part of the security leadership teams of both Accenture and Deloitte and leading strategy, partnerships and corporate development for Mandiant. Jeff has a Bachelor’s degree in Optical Engineering from the University of Rochester, and a Masters degree in Electrical Engineering from UC Berkeley.
Host
6. The EDR Honeymoon Period is Over: The Power of Deep Learning to Combat AI Threats – Carl Froggett – RSA24 #3
The recent rise in adversarial AI has made it clear: organizations must fight AI with better AI. Gone are the days of relying on legacy, antiquated endpoint detection and response offerings, or cybersecurity tools that are based on ineffective machine learning models. In this interview, Deep Instinct CIO Carl Froggett will explain why Deep Learning is the most superior form of AI, and the technology’s role in powering predictive prevention.
This segment is sponsored by Deep Instinct. Visit https://securityweekly.com/deepinstinctrsac to learn more about them!
Guest
Carl Froggett is Deep Instinct’s Chief Information Officer (CIO). He has a track record in building teams, system architectures, and large-scale enterprise software implementations, while aligning processes and tools with business requirements. Froggett was formerly Head of Global Infrastructure Defense, CISO Cyber Security Services at Citi. In this role, Froggett delivered integrated risk reduction capabilities and services aligned to the architectural, business, and CISO priorities across Citi’s devices and networks in 100+ countries. Since 1998, he’s held various regional and global roles, covering all aspects of architecture, engineering, global operations, and running critical enterprise cyber services for Citi’s cybersecurity functions.
Host
7. Unforeseen Outcomes of Innovation – Amit Sinha – RSA24 #3
Over the past two years, we’ve seen the degree of digital trust in our day-to-day lives being pushed to its limits due to the unintended consequences of innovation. From GenAI to IoT security to quantum computing, we will see a “crescendo of trust” that will push trust to its absolute limits. Here, we will focus on IoT/device trust.
This segment is sponsored by DigiCert. Visit https://securityweekly.com/digicertrsac to learn more about them!
Guest
Dr. Amit Sinha is CEO of DigiCert. Prior to DigiCert, Dr. Sinha was President of Zscaler. During his 12-year tenure, Zscaler grew from a startup to a NASDAQ-100 company and established itself as a dominant leader in enterprise security. Dr. Sinha is an independent Board Member at Zscaler and at DataRobot, an AI cloud platform company, and an advisor to several startups.
Prior to Zscaler, Dr. Sinha served as CTO for Motorola’s Enterprise Networking and Communications business, delivering Wi-Fi solutions. He was the CTO of AirDefense, a market leader in the wireless security space, leading to its successful acquisition by Motorola in 2008. Prior to AirDefense, Dr. Sinha served as Co-Founder and Chief Technologist at Engim, a Wi-Fi semiconductor company.
Dr. Sinha earned his Masters and Ph.D. in Electrical Engineering and Computer Science from the Massachusetts Institute of Technology, Cambridge, and his B.Tech. in Electrical Engineering from the Indian Institute of Technology, Delhi, where he graduated summa cum laude and was awarded the President of India Gold Medal. He has authored over 25 journal/conference papers, contributed to 3 books, and is the inventor of 39 U.S. patents granted or pending.
Host
8. Security through Data – Cisco Hypershield – Jeetu Patel – RSA24 #3
Security needs to be everywhere a potential threat exists – from an IOT device to an OT device, a factory floor, an element of infrastructure, an oil rig, a robotic device or an MRT machine – Cisco recognized that with increased connection comes a greater risk than ever before and that you must bring the security to these workloads...not the other way around.
In order to keep up with today’s sophisticated and expansive threat landscape, security can no longer be a fence; it needs to be embedded through the fabric of data centers, whether public or private. Cisco Hypershield does just that and gives defenders a fighting chance against adversaries, as now the industry has the advantage.
Segment Resources: Hypershield Keynote: https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2024/m04/unveiling-a-new-era-of-ai-native-security-with-cisco-hypershield.html
Cybersecurity Readiness Index: https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2024/m03/cybersecurity-readiness-index-2024.html
DUO trusted access report: https://duo.com/assets/ebooks/2024-Duo-Trusted-Access-Report.pdf
Jeetu's blog: https://blogs.cisco.com/news/cisco-hypershield-security-reimagined-hyper-distributed-security-for-the-ai-scale-data-center
Official announcement: https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2024/m04/unveiling-a-new-era-of-ai-native-security-with-cisco-hypershield.html
This segment is sponsored by Cisco. Visit https://securityweekly.com/ciscorsac to learn more about them!
Guest
Jeetu Patel is Cisco’s Executive Vice President and General Manager of Security and Collaboration. He leverages a diverse set of capabilities to lead the strategy and development for these businesses and also owns P&L responsibility for this multibillion-dollar portfolio. Jeetu combines a bold vision, steeped in product design and development expertise, operational rigor and innate market understanding to create high growth Software as a Service (SaaS) businesses.
A member of the Executive Leadership Team, Jeetu is helping to redefine Cisco’s SaaS business and strategy to further accelerate the company’s transformation and growth. His mission is to build world class, subscription-based products that solve Cisco customers’ biggest problems. His team is creating and designing meaningfully differentiated products that diverge in the way they’re conceived, built, priced, packaged and sold.
Host
9. Understanding – and securing against – next generation threats – Paul Reid – RSA24 #3
Emerging threats are targeting organizations from seemingly every angle. This means security teams must expand their focus to secure as many domains as possible. OpenText is building on its holistic approach to cybersecurity with new innovations that make it easier for organizations to secure themselves against next generation threats.
This segment is sponsored by OpenText. To learn more about new innovations announced at RSA to protect organizations from next generation threats, visit https://securityweekly.com/opentextrsac!
Guest
Paul Reid is Global Head of Threat Intelligence at OpenText Cybersecurity. A veteran of the complex, fast-paced world of cybersecurity, Paul has served as a technology strategist for more than two decades at innovative technology companies. Leveraging his deep expertise in cybersecurity, biometrics, network security, cryptography, and more, Paul helps guide customers, partners, industry analysts, and journalists through the intricate cybersecurity landscape. Most recently he led a team of cyber threat hunters leveraging behavioral analytics to find emerging threats in customer environments.
Paul is a frequent keynote speaker and has shared his perspectives at several prominent industry conferences including the NATO Information Assurance Symposium, SANS@Night, and Microsoft TechED. He is a published author in the Prentice Hall Series in Computer Networking and Distributed Systems. Paul also holds several patents in cybersecurity.
Host
10. Leveling the Cybersecurity Playing Field – Jim Simpson – RSA24 #3
In this segment, Jim can discuss how organizations can enhance their cybersecurity posture with Blumira’s automated threat monitoring, detection and response solutions. Jim can talk about the exciting plans Blumira has in store for the next 3 years, emphasizing how the company is lowering the barrier to entry in cybersecurity for SMBs.
Segment Resources: https://www.blumira.com/customer-stories/ https://www.blumira.com/why-blumira/
This segment is sponsored by Blumira. Interested in learning what Blumira can do for your business? Visit https://securityweekly.com/blumirarsac to book a demo!
Guest
Jim Simpson, CEO of Blumira, strives to eliminate gatekeeping in the infosec industry, removing the barriers that prevent smaller teams from achieving successful security programs. Jim guides the company’s strategic product roadmap to deliver the fastest time to security, with a focus on easy-to-use detection and response technology. Under his leadership, Blumira released the industry’s only free, self-service cloud security information and event management (SIEM) delivering on the mission to make security accessible to organizations of all sizes.
Prior to Blumira, Simpson led product management at Duo Security, an access security provider that was acquired by Cisco in 2018 for $2.35 billion. He also led engineering and user experience teams through growth and acquisition at Arbor Networks, a network and management security provider, which was acquired by NETSCOUT in 2015.
Host
11. Empowering Today’s Security Teams With AI-Powered Analytics and Actioned Insights – Anthony Aurigemma – RSA24 #3
Anomali’s breakthrough AI-Powered Security Operations Platform is a cloud-native solution that delivers the industry’s most comprehensive set of integrated and automated security functions. Anthony Aurigemma, Anomali’s Chief Revenue Officer, discusses how Anomali Copilot automates mundane tasks and enables better analytics and reasoning for today’s security teams – automating half of an analyst’s day, enabling them to focus on strategic work. With the ability to augment or replace legacy security systems, Anomali’s Security Operations Platform helps security teams deliver intelligent, actionable, and accurate insights to their business.
Segment Resources: https://www.anomali.com/blog/cybersecurity-priorities-2024-report-top-10-takeaways
https://www.anomali.com/blog/introducing-anomali-copilot-your-ai-powered-security-assistant
This segment is sponsored by Anomali. Visit https://www.securityweekly.com/anomalirsac to learn more about them!
Guest
Anthony is a seasoned Senior Executive with more than two decades of experience spanning technology Sales, Business Development, Strategic Alliances, Services, and Operations. He showcases a proven aptitude for building robust teams, ensuring exceptional client satisfaction, and surpassing performance objectives. His passion is to help companies think differently about their Security and IT investments, harnessing software and service solutions to enhance business oversight, increase employee satisfaction, and elevate product and service quality.
Host
12. Creating Phishing-Resistant Users Helps Enterprises Achieve True Passwordless Auth – Christopher Harrell – RSA24 #3
In the dynamic landscape of cybersecurity, the urgency to eliminate passwords as a security vulnerability has never been more critical. Organizations are continuing to face a surge in the variety and complexity of cyber threats at historical rates, often fueled by compromised employee login credentials – resulting from attacks such as phishing which has been exacerbated by the rise in use of Artificial Intelligence (AI). The 2023 Verizon Data Breach Investigations Report underscores the staggering impact of breaches caused by stolen credentials, accounting for a staggering 74% of incidents. Christopher Harrell, Yubico’s Chief Technology Officer, shares how organizations can achieve passwordless authentication at scale with high assurance phishing-resistant multi-factor authentication (MFA) to elevate their security posture against phishing attacks while creating phishing-resistant users.
Segment Resources: https://www.yubico.com/blog/empowering-enterprise-security-at-scale-with-new-product-innovations-yubikey-5-7-and-yubico-authenticator-7/
This segment is sponsored by Yubico. Want to be among the first to own YubiKeys and Security Keys with the new 5.7 firmware? Please visit https://securityweekly.com/yubicorsac to sign-up to be notified when the devices become available!
Guest
Christopher Harrell is the Chief Technology Officer at Yubico where he is responsible for driving innovative authentication and security products to market. He has more than 20 years of security engineering and architecture expertise along with extensive experience managing and leading teams.
Previously, Christopher served as Director of Security Engineering at Yahoo, and as Information Security Manager at Apple. Together, in these roles, Christopher had the opportunity to secure hundreds of thousands of computers, impacting billions of users worldwide. Christopher is passionate about the potential for technology to improve lives. He believes that security and usability can co-exist, and enjoys the engineering challenge of proving it.
Host
13. Defending against AI and new deepfake technology threats & How an MSSP can help – Jim Broome – RSA24 #3
The past two years have witnessed an unprecedented surge in the adoption of generative artificial intelligence (AI) across various industries. And while this presents new efficiencies, with these benefits come significant security concerns. The widespread integration of AI applications increases the risk of data breaches and intellectual property theft, while also expanding organizations' vulnerability to malicious data injection and other AI-driven cyberattacks. During this interview Jim will explore why it’s imperative to implement robust security measures to mitigate these evolving risks effectively, and how working alongside an MSSP can benefit your overall security posture.
Segment Resources: https://go.directdefense.com/2023-Security-Operations-Threat-Report
This segment is sponsored by DirectDefense. DirectDefense is offering a free reconnaissance and information gathering service to potential new clients. Visit https://securityweekly.com/directdefensersac to learn more!
Guest
Jim Broome is a seasoned IT/IS veteran with more than 20 years of information security experience in both consultative and operational roles. Jim leads DirectDefense, where he is responsible for the day-to-day management of the company, as well as providing guidance and direction for our service offerings.
Previously, Jim was a Director with AccuvantLABS where he managed, developed, and performed information security assessments for organizations across multiple industries. Prior to AccuvantLABS, Jim was a Principal Security Consultant with Internet Security Systems (ISS) and their X-Force penetration testing team.
Host
14. AI in SecOps: Separating Fact from Fiction – Jason Keirstead – RSA24 #3
In this candid discussion, Jason Keirstead, Cyware's VP of Collective Threat Defense, takes us beyond the AI buzz in cybersecurity, addressing the hype vs. hyperbole spreading across the industry. While AI has tremendous potential for cybersecurity, Jason emphasizes its pragmatic and deliberate application to modernize security operations — not as a panacea but as a strategic ally in enhancing threat intelligence, response capabilities, and operational collaboration. This segment navigates through the practical benefits and limitations of AI, offering insights into how security professionals can leverage AI to augment, not replace, human decision-making and creativity in the ongoing fight against cyber threats. Join us to demystify AI's role in cybersecurity and discover how to harness it to make security teams more effective and efficient.
Segment Resources: Blog: Navigating the AI Terrain: 10 Key Questions to Ask Cybersecurity Vendors https://cyware.com/blog/navigating-the-ai-terrain-10-key-questions-to-ask-cybersecurity-vendors-03e4 Blog: Generative AI and Cybersecurity Operations: The Criticality of Standardization https://cyware.com/blog/generative-ai-and-cybersecurity-operations-the-criticality-of-standardization-b766 Security Guide: SOAR and AI in Cybersecurity – Reshaping Security Operations https://cyware.com/security-guides/security-orchestration-automation-and-response/from-insight-to-action-how-ai-and-soar-are-reshaping-security-operations-13d9
This segment is sponsored by Cyware. Visit https://securityweekly.com/cywarersac to book a demo!
Guest
Jason Keirstead is VP of Collective Threat Defense at Cyware, where he is working to advance the state-of-the-art in collaborative intelligence, detection and response. He has over 20 years experience in the industry, and is a subject-matter expert in topics such as threat intelligence, SIEM, SOAR, EDR, and XDR. Jason also sits on the board of directors of the OASIS Open standards organization, the governing board of the Open Cybersecurity Alliance, and participates in many other organizations in the open security space.
Host
15. Evolving nature of ransomware attacks – Kris Lahiri – RSA24 #3
In recent years, ransomware attacks have undergone a transformative evolution, shifting from indiscriminate, mass-distributed assaults to highly targeted, sophisticated campaigns. Kris Lahiri is able to discuss the dynamic landscape of ransomware and dive into the techniques he has seen cybercriminals employ, the motivations behind these attacks, and the escalating impact on individuals, businesses, and critical infrastructure.
Segment Resources: https://www.egnyte.com/solutions/ransomware-detection https://www.egnyte.com/guides/governance/ransomware
This segment is sponsored by Egnyte. Visit https://securityweekly.com/egnytersac to learn more about them!
Guest
Kris is a co-founder of Egnyte. He is responsible for creating and implementing Egnyte’s global information security and compliance management strategies, policies and controls that protect all of Egnyte’s customers’ content and users. Prior to Egnyte, Kris spent many years in the design and deployment of large-scale infrastructures for Fortune 100 customers of Valdero and KPMG Consulting. Kris has a B.Tech in Engineering from the Indian Institute of Technology, Banaras, and an MS from the University of Cincinnati.
Host
16. SquareX is disrupting the browser security market – Vivek Ramachandran – RSA24 #3
Attackers are targeting enterprise users when they are online via attacks like spear phishing, malicious docs infected with malware/ransomware.
Today SASE/SSE’s Secure Web Gateway (SWG) component is touted as the solution to this problem. These SWGs look at traffic between the enterprise users and websites and try to infer attacks.
Unfortunately, attackers are subverting these SWGs and breaking into enterprises. There is an urgent need to stop this and the solution seems to be to have a browser native security agent which can detect-mitigate attacks happening on the users browser and allow enterprises to threat hunt web attacks company wide.
Segment Resources: Why Browser Native Solutions are better than Cloud Based Proxies: https://drive.google.com/file/d/1cItXj1KEm45ZNklASFmcvprbPqZChcMn/view?usp=sharing
Data Sheet: https://drive.google.com/file/d/1tv3q2iTFROJPceq2b9SJtzkdHD9J6mvC/view?usp=sharing
Blog on the Many Failures of Secure Web Gateways: https://labs.sqrx.com/the-unspoken-challenges-of-secure-web-gateways-c516bc287a6d
Latest Press Release: Forbes: Critical Security Flaws Found In Email Top 4—Apple, Gmail, Outlook & Yahoo (https://www.forbes.com/sites/daveywinder/2024/04/04/critical-security-flaw-in-apple-icloud-google-gmail-microsoft-outlook-yahoo-mail-aol-mail-email/)
This segment is sponsored by Square X. Visit https://securityweekly.com/squarexrsac to learn more about them or visit them at RSAC booth 336!
Guest
Vivek Ramachandran is a security researcher, book author, speaker-trainer, and serial entrepreneur with over two decades of experience in offensive cybersecurity. He is currently the founder of SquareX, building a browser-native security product focused on detecting, mitigating, and threat-hunting web attacks against enterprise users and consumers. Prior to that, he was the founder of Pentester Academy (acquired in 2021), which has trained thousands of customers from government agencies, Fortune 500 companies, and enterprises from over 140+ countries. Before that, Vivek’s company built an 802.11ac monitoring product sold exclusively to defense agencies.
Vivek discovered the Caffe Latte attack, broke WEP Cloaking, conceptualized enterprise Wi-Fi Backdoors, and created Chellam (Wi-Fi Firewall), WiMonitor Enterprise (802.11ac monitoring), Chigula (Wi-Fi traffic analysis via SQL), Deceptacon (IoT Honeypots), among others. He is the author of multiple five-star-rated books in offensive cybersecurity, which have sold thousands of copies worldwide and have been translated into multiple languages.
He has been a speaker/trainer at top security conferences such as Blackhat USA, Europe and Abu Dhabi, DEFCON, Nullcon, Brucon, HITB, Hacktivity, and others. Vivek’s work in cybersecurity has been covered in Forbes, TechCrunch, and other popular media outlets.
In a past life, he was one of the programmers of the 802.1x protocol and Port Security in Cisco’s 6500 Catalyst series of switches. He was also one of the winners of the Microsoft Security Shootout contest held in India among a reported 65,000 participants. He has also published multiple research papers in the field of DDoS, ARP Spoofing Detection, and Anomaly-based Intrusion Detection Systems. In 2021, he was awarded an honorary title of Regional Director of Cybersecurity by Microsoft for a period of three years, and in 2024 he joined the BlackHat Arsenal Review Board.